Maintenance & Support

Packages

I’ll Make You Famous

We’ve all heard news stories about insider trading. Wall Street executives with advance knowledge of a company’s plans sell off or buy volumes of stock, knowing that the price will go up or down, and make lots of money illegally. We’ve also heard the tales of an athlete or player who bets against his own team and then allows a goal or creates a play to ensure the outcome in his favor and his team’s misfortune. And the many instances of when ardent fans of a team believe that a referee has done the same. This insider betrayal is not a new phenomenon. In the Shakespeare play ‘Julius Caesar’, Caesar is famously betrayed by a confidant, a trusted insider, Brutus. Thus the famous line, ‘et tu Brute’ (basically, ‘and you Brutus!’). Also, in current pop culture, the TV series ‘Mr. Robot’, the central character Elliot hacks into the mega-company Evil Corp’s financial systems creating a global meltdown. He does this as a trusted employee of Evil Corp.

From these examples, and many more, you would think that we might take our own internal security a bit more to heart. Knowing that our well-placed trust is backed up by systems that will inhibit, prevent and track any potential breaches either intentional or otherwise, would certainly make sense and help us sleep better.

This has never been more true and timely than in today’s business environment.

When we think of cyber security threats, many of us conjure up images of shadowy figures conducting attacks from the privacy of their bedrooms. As hard as it might be to believe, though, an organization’s biggest security risk is actually its own employees.

75% of large organizations have suffered staff-related security breaches, with 50% of the worst breaches caused by human error, according to a report published by Axelos.

More often than not, employees compromise security unwittingly. The Cyber security breaches survey 2017 reveals that 72% of reported cases of cyber security breaches occur after a staff member receives a fraudulent email. Shockingly, only 20% of staff surveyed had attended any form of cyber security training.

But while employees may not act maliciously, these actions pose serious and real risks. In fact, we know that up to 43% of all data breaches are the result of insiders either inadvertently or maliciously putting data at risk.

You can build a wall, set up perimeter defenses, and spend massive resources maintaining it all. But if your enemy is within, that wall will do you no good. And if you do have a problem, perhaps your company will become suddenly famous, also in a way that will do you no good.

Perhaps not as famous as the Google lawsuit of Uber in which a former employee was stealing highly sensitive driverless car files and data. Or, a former IBM employee who built a copy of particular software and offered his copy for sale to aid himself financially and help his home country. Or a theft from a green-energy company of wind turbine efficiency data by an employee jumping to a competitor which saved his new company $800m and nearly bankrupted his former employer and caused a job loss of half the global workforce.

This is not the kind of ‘famous’ that anyone wants.

At Vector, we would rather help your company get famous based on your success rather than a news story you don’t ever want to see. LEARN MORE >>

Call( 04 363 3301) us at Vector!

We can help you ensure your security with the latest solutions and leading-edge technology to make sure you don’t get the fame that you don’t want.